Unusual event detection in real-world surveillance applications

J Kuklyte - 2014‏ - doras.dcu.ie
Given the near-ubiquity of CCTV, there is significant ongoing research effort to apply image
and video analysis methods together with machine learning techniques towards …

[PDF][PDF] Efficient intrusion detection in high-speed networks.

F Erlacher - 2019‏ - digital.ub.uni-paderborn.de
To keep today's computer networks up and running, it is paramount to detect all attacks and
malicious activities contained in the network traffic. This makes network intrusion detection …

[PDF][PDF] Ensemble Methods in Intrusion Detection

KT Josiah - 2015‏ - eprints.utm.my
As services are being deployed on the internet, there is the need to secure the infrastructure
from malicious attacks. Intrusion detection serves as a second line of defense apart from …

Une technique robuste et intelligente de détection par vidéosurveillance d'objets abandonnés dans les zones de transit

I DAHI - 2018‏ - pnst.cerist.dz
Résumé En raison des préoccupations de plus en plus croissantes au sujet de la sécurité
mondiale, il est devenu essentiel d'avoir en place des systèmes efficaces de détection des …